The presentation discusses a vulnerability in the IOTA cryptocurrency's hash function, curl p27, which allowed for chosen message signature forgery attacks. The vulnerability was caused by the simplicity of the transform function in curl p27.
- The vulnerability allowed for chosen message signature forgery attacks in both multi-sig and non multi-sig scenarios
- The vulnerability was caused by the simplicity of the transform function in curl p27
- The attack was performed by creating colliding bundles and changing the tag field to rerun the attack
- The vulnerability was disclosed to IOTA developers and fixed by replacing curl in signature generation with a hash function called curl put curl with a K
- The presentation highlights the importance of not creating one's own hash functions and the limitations of small S boxes in cryptography
The presenters demonstrated the attack by creating colliding bundles and changing the tag field to rerun the attack. They were able to find the first collision in about three seconds using 80 cores and the second collision in about 23 seconds on average on 80 cores. The attack allowed for the creation of colliding bundles, which resulted in different values being assigned to different parties in the transaction. The vulnerability was disclosed to IOTA developers and fixed by replacing curl in signature generation with a hash function called curl put curl with a K.